Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:PCI Compliance (Score 1) 314

If you think Snowden is intentionally cooperating with those governments, you have the burden of explaining why he went public, instead of just moving into his dacha and enjoying his ill-gotten gains.

If you think those governments have tried to get the data without his knowledge, bear in mind that he's technically sophisticated and it's inconceivable that he didn't encrypt his drive.

If you think the Russians are employing rubber hose cryptanalysis, bear in mind that he is still in contact with several western journalists, and it's very likely that they have prearranged codes to let him communicate such a message.

Comment Re:News? (Score 1) 314

True. This is actually one of the more legitimate things the feds are doing. It has a clear connection to anti-terrorism efforts, and I really don't think people who are using banks to transfer money have much expectation of privacy, as they do when talking on the phone, emailing, etc.

Comment Re:Pay cash !!!! (Score 2) 314

Consider: in the US, you generally get only $20 bills from the ATM. You go and spend these with retailers who usually get nothing larger than $20 bills. The $20 bill you spent thus is not recycled as change, and it gets deposited at the end of the day. That makes a nice short loop that's easy to analyze.

So if you want to buy something and not make it too easy to track the bills, use denominations under $20.

Now, as for things like making a drug buy, where you really wouldn't want the gov't to track it, that's probably less of a problem because those people tend not to use banks so much...

Comment Re:Why? (Score 2) 133

I'm still not sure what makes 3D printed guns any different or more special than a gun produced with CAD plans and a used CNC machine.

Good point. I see two reasons for "the authorities" to be more worried about 3D guns. First is (I would guess) CNC is fairly mature and stable, while 3D printing is undergoing rapid development, becoming cheaper, more versatile, more accessible. Second is that a CNC machine is something of a niche application, not interesting to many people, whereas 3D printing can make a much wider variety of things and is therefore potentially of interest to more people. Thus, 3D printed firearms are potentially accessible to many more people, and, with future technology, easier to produce.

Comment Re:optical inspection? (Score 1) 166

Yes, I just realized this. A properly written OS can periodically test the hardware RNG for reduced entropy. Let us suppose we can detect if the entropy has fallen below 32 bits. Then, whenever we are using the hardware RNG, we pessimistically assume that there are only 16 bits of entropy available per sample. Grab a bunch, run it through a good hash function, repeat, concatenate. You end up with as many bits of good random data as you need, and you XOR it with the random bits you got from other sources.

Comment Fluoride (Score 1) 149

It seems that they did not control for exposure to fluoridated water. The article says "they had no data on the causes of missing teeth." It would be interesting to see if any clear results emerged from a study that did control for that.

However, given the level of entrenched interest in water fluoridation, I suspect it would be difficult to find funding for such a study, at least in the US.

Submission + - Defeating censorship by using the DUST protocol (lwn.net)

Taco Cowboy writes: With PRISM snooping on every one of us and with Great Firewall of China effective blocking everything that is deemed "unsafe", a new protocol is badly needed to return some sanity to the Net.

Available at https://github.com/blanu/Dust , the Dust protocol was designed to defeat censorship, as well as to enable us a chance to hop around the Net without, hopefully, being noticed.

Encrypted communication atop TCP or UDP can be easily identified, and can be blocked by governments or ISPs.

Before the advent of DUST, there have been a number of different projects that provide some form of censorship resistance, including document publishing services such as Publius, Tangler, and Mnemosyne. But in order to retrieve documents, users must be able to connect to the service, which is easy to thwart via IP address blocking.

What is needed, then, is a way to avoid the DPI filters while connecting to the anonymizing proxy. To that end, "The ideal communication protocol is therefore one which is unobserveable, meaning that a packet or sequence of packets is indistinguishable from a random packet or random sequence of packets", according to Dust developer Brandon Wiley

Key exchange is the most difficult piece of any encryption puzzle. To some extent, Dust punts on that by requiring an "out of band" invitation to be received by a client before it can connect to the server. The invitation has the IP address, port, and public key for the server, along with an invitation-specific password and invitation ID, all of which is encrypted using the password. The invitation ID is a random, single-use identifier that the server can use to determine which invitation (and thus which password) is being used when the client introduces itself with the invitation.

The actual invitation is of no use without the password, so it could be sent via any channel. Because of the encryption, the invitation is "indistinguishable from random bytes".

The packets are protected with a message authentication code (MAC) and the MAC is calculated using a password-based key derivation function (PBKDF) with a random initialization vector (IV) transmitted with each Dust packet. Both the MAC and IV are sent in the clear; since the IV is a random per-packet value and the MAC is calculated from it, both are effectively random to an observer. In the encrypted portion of the packet, timestamps are included to protect against replay attacks and a random amount of random-padding bytes is added to each packet so that the packet length is unpredictable. As might be obvious, good random number generation is an important part of a Dust implementation.

Again, DUST is available at https://github.com/blanu/Dust

Submission + - How Lua became successful, but not in Brazil (foreignaffairs.com)

Ian Grant writes: Yuri Takhteyev, an Assistant Professor at Toronto University, looks very briefly at how Lua is almost unknown in Brazil, even as it becomes popular elsewhere. An interesting story considering Wikipedia's recent decision to use the language

Take the decision of the language’s creators to write Lua’s documentation (the instructions on how to use Lua) in English. Wikimedia Foundation’s engineers note Lua’s excellent documentation as one of the reasons for choosing it over Google’s version of JavaScript.


Submission + - Google Execs Used Discount Code 'NASA' to Buy Jet Fuel 1

theodp writes: When Google CEO Larry Page gassed-up three of the jets he owns (with Sergey Brin and Eric Schmidt) to tote guests to his brother-in-law's wedding in Croatia, Pentagon records show that the trio's corporate entity H211 bought 24,000+ gallons of jet fuel at NASA's Moffett Field just prior to the departure, paying an average of $3.33 a gallon, at least $1.10 per gallon less than the going rate. The Dept. of Defense, it turns out, only just ended a program in which it sold sharply discounted fuel to three of the world's richest men for use in their fleet of jets parked at Moffett. The move, according to the WSJ, followed discussions earlier this year between the Pentagon and NASA over whether the Google founders may have exceeded contract terms by using sharply discounted jet fuel bought from the Pentagon for non-government flights. In April, Wired reported that Google’s top three execs are expected to move their collection of jets to an $82 million private terminal at Mineta San Jose International Airport

Submission + - "Open source, open world" - Foreign Affairs on FOSS in Brazil (foreignaffairs.com)

Ian Grant writes: A brief, "not for the geek", look at open source software in Brazil and how it's transforming tech use in South America:

Bringing free software to Brazil, however, is not just a matter of copying North American practices. The idea of free software has also been substantially transformed through contact with Brazilian politics.


Book Reviews

Submission + - Book Review: Citrix XenApp Performance Essentials (packtpub.com)

gbrambilla writes: A problem every system administrator has to face sooner or later is to improve the performance of the infrastructure that he administers. This is especially true if the infrastructure is a Citrix XenApp farm that publishes applications to the users, that starts complaining as soon as those applications become slow.

Citrix XenApp Performance Essentials, by Luca Dentella, is a practical guide that helps system administrators to identify bottlenecks, solve performance problems and optimize XenApp farms thanks to best-practices and real-world examples.


A well-designed infrastructure may help to solve a lot of headaches when the infrastructure is in production... in chapter 1 the book explains the most important elements of a XenApp infrastructure (session-host servers, datastore servers, web interface servers...), their role, how they work together and how to correctly size them based on the number of users and applications that will be served. This chapter includes not only best practices from Citrix, but also precious suggestions that come from author's experience with real Citrix farm.

When a farm is in production and users start to connect and work with published applications, it's very important to monitor its performance: in chapter 2 Luca explains how to monitor it, from the basic Windows Performance counters to the use of advanced Citrix tools. XenApp offers several advanced settings (CPU Utilization Management, Memory Optimization, Load evaluators ...) to improve the performance: all these features are covered in the second half of this chapter, including the new ones of version 6.5.

A typical complaint about applications published by XenApp is that they start slowly... this is usually because of slow session start-up. Chapter 3 teaches the most frequent causes of slowness and how to reduce the start-up time, including the use of the new features of XenApp 6.5 (Session Sharing and Lingering).

Multimedia applications are becoming more and more frequently published by XenApp farm, that's why Luca wrote a chapter, the forth, to explain the technologies Citrix offers under the brand of HDX and how you can take advantage of them for publishing video/audio/VoIP applications.

The last chapter is about remote users, i.e. users that connect to the farm using WAN (wide-area network) connections. Citrix offers different optimizations and Citrix administrators can work together with network admins to improve the user-experience with the use of QoS, priorities... It's usually hard to understand how published applications work with slow, laggy links; Luca found an opensource tool, named WanEM, that can simulate every kind of links; in chapter 5 you'll also learn how to use it.

Submission + - Japans new rocket has onboard AI (sky.com)

SpaceGhost writes: Sky News reports that the Japanese Space Agency (JAXA) has launched an orbital telescope on a new generation rocket from the Uchinoura Space Centre in Kagoshima, in southwestern Japan. The Epsilon rocket uses an onboard AI for autonomous launch checks by the rocket itself. Focusing on reducing costs, the new vehicle required 2 laptops and a launch team of 8, vs the 150 people needed to launch the previous platform, the M-5. Because of the reduced launch team and ease of construction, production and launch costs of the Epsilon are roughly half of the M-5. The payload, a SPRINT-A telescope, is designed for planetary observation.

Submission + - The Boy Genius of Ulan Bator (nytimes.com)

An anonymous reader writes: A lot of us grew up tinkering with electronics and cherishing the one or two reference books we could find that explained exactly what we wanted to know. Nowadays, with internet access widely available and online educational materials coming into their own, we're going to see a lot more kindred spirits coming out of places all over the globe. The NY Times has a story about one such, a lad from Mongolia who hacked together complex sensors at the age of 16 and was one of the 0.2% of students to get a perfect score on MIT's first Massive Open Online Course. From the article: 'Battushig, playing the role of the car, moved into the sensor’s path to show me how it worked, but it was clear he was not entirely satisfied with his design. “The use of the long wires is very inconvenient for my users,” he said, almost apologetically, clasping his hands together in emphasis. He realized that contractors would be reluctant to install the siren in other buildings if they had to deal with cumbersome wiring, so he was developing a wireless version. ... Battushig has the round cheeks of a young boy, but he is not your typical teenager. He hasn't read Harry Potter ("What will I learn from that?") and doesn't like listening to music (when a friend saw him wearing headphones, he couldn't believe it; it turned out Battushig was preparing for the SAT). His projects are what make him happy. "In electrical engineering, there is no limit," he said.'

Submission + - Top 10 Best Android Apps for Free

Anzaq Ali writes: Android OS is best and we all knew about it and now it is most famous mobile OS. Because of its popularity and increasing demand in massive everyday developers introducing new apps to provides comfort to Android users and make their life more fast, easier and simple. There are lot of apps available in Android market but here in this post have listed only Top 10 Best Android Apps for Free that every android user must use to make their work simple, easier and fast.
http://www.anzaq.com/2013/09/top-10-best-android-apps-for-free_14.html

Submission + - 45% of U.S. Jobs Vulnerable to Automation (technologyreview.com) 2

An anonymous reader writes: A new report out of Oxford has found that the next 20 years will see 45% of America's workforce replaced by computerized automation. 'The authors believe this takeover will happen in two stages. First, computers will start replacing people in especially vulnerable fields like transportation/logistics, production labor, and administrative support. Jobs in services, sales, and construction may also be lost in this first stage. Then, the rate of replacement will slow down due to bottlenecks in harder-to-automate fields such engineering. This "technological plateau" will be followed by a second wave of computerization, dependent upon the development of good artificial intelligence. This could next put jobs in management, science and engineering, and the arts at risk.' 45% is a big number. Politicians have been yelling themselves hoarse over the jobs issue in this country for the past few years, and the current situation isn't anywhere near as bad. At what point will we start seeing legislation forbidding the automation of certain industries?

Slashdot Top Deals

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...